Search

Your search keyword '"TELECOMMUNICATION security"' showing total 2,218 results

Search Constraints

Start Over You searched for: Descriptor "TELECOMMUNICATION security" Remove constraint Descriptor: "TELECOMMUNICATION security"
2,218 results on '"TELECOMMUNICATION security"'

Search Results

101. Patent Issued for Hearing device and method of updating a hearing device (USPTO 12041419).

102. NATO Backs Effort to Save Internet by Rerouting to Space in Event of Subsea Attacks.

103. Secrecy transmission capacity in mobile ad hoc networks with security‐aware Aloha protocol.

104. Performance analysis of incoherent PPM‐OCDMA networks based on optimised modified prime code for multimedia applications.

105. Localisation algorithm for security access control in railway communications.

106. MMSE‐based secure precoding in two‐way relaying systems.

107. QoS‐aware stochastic spatial PLS model for analysing secrecy performance under eavesdropping and jamming.

108. Buffer‐aided relaying: a survey on relay selection policies.

109. Optimal rotation angle for finite constellation over additive white Gaussian noise multiple access wiretap channel.

110. Taxonomy of secure data dissemination techniques for IoT environment.

111. Distributed fusion estimation for non‐linear networked systems with random access protocol and cyber attacks.

112. Resilient dynamic event‐triggered control for multi‐area power systems with renewable energy penetration under DoS attacks.

113. Stability‐guaranteed dynamic ElGamal cryptosystem for encrypted control systems.

114. ACO–IBR: a modified intersection‐based routing approach for the VANET.

115. Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps.

116. Achieving secure and convenient WLAN sharing in personal.

117. Multi‐party key generation protocol for the identity‐based signature scheme in the IEEE P1363 standard for public key cryptography.

118. Efficient elliptic curve Diffie‐Hellman computation at the 256‐bit security level.

119. Pairing free identity based aggregate signcryption scheme.

120. Secrecy outage analysis of satellite communication networks with hardware impairments and channel estimation errors.

121. Credibility‐based secure distributed load frequency control for power systems under false data injection attacks.

122. Differential attacks on reduced‐round SNOW 3G and SNOW 3G⊕.

123. Improved SIMD implementation of Poly1305.

124. Secure and load‐balanced routing protocol in wireless sensor network or disaster management.

125. Energy efficient aggregation technique‐based realisable secure aware routing protocol for wireless sensor network.

126. LUT‐based high‐speed point multiplier for Goldilocks‐Curve448.

127. Physical unclonable function: architectures, applications and challenges for dependable security.

128. Scalable and efficient authentication scheme for secure smart grid communication.

129. Energy efficient secure MIMO transmission in the presence of smart attacker.

130. Study on attack paths of cyber attack in cyber‐physical power systems.

131. Cybersecurity considerations for communication based train control

132. Assessing DER network cybersecurity defences in a power-communication co-simulation environment

133. Hybrid data-driven physics model-based framework for enhanced cyber-physical smart grid security

134. Performance analysis of one-step prediction-based cognitive jamming in jammer-radar countermeasure model

135. Game-theoretic cybersecurity analysis for false data injection attack on networked microgrids

136. Computationally efficient mutual authentication protocol for remote infant incubator monitoring system

137. Reducing energy consumption of wireless sensor networks using rules and extreme learning machine algorithm

138. Efficient proxy ring signature for VANET

139. Editor's Note.

140. MAKING WAVES WITH AMATEUR RADIO.

141. Active Learning Techniques Applied in the Course "Telecommunication Security".

142. A spectrum sharing model that counters eavesdropping.

143. Secure resource allocation for green two‐way relay networks with mutually untrusted relay and mobile users.

144. Selective SIGINT: Collecting Communications Intelligence While Protecting One's Own.

145. Ensuring telecommunication network security through cryptology: a case of 4G and 5G LTE cellular network providers.

146. European Regulation of Smartphone Ecosystems.

147. Performance analysis of one-step prediction-based cognitive jamming in jammer-radar countermeasure model.

148. Canadian National Security in Cyberspace: The Legal Implications of the Communications Security Establishment's Current and Future Role as Canada's Lead Technical Cybersecurity and Cyber Intelligence Agency.

149. Adaptive PSO with optimised firefly algorithms for secure cluster‐based routing in wireless sensor networks.

150. Trust enforcement in vehicular networks: challenges and opportunities.

Catalog

Books, media, physical & digital resources